Korean
<< Back
VID 14125
Severity 10
Port 22
Protocol TCP
Class LSC
Detailed Description Intruders can obtain the system information from illegally created or hidden suspicious files, and can change files arbitrarily. You should delete illegal or suspicious files after checking for

the existence of hidden files starting with [.].

* Affected platforms:
UNIX, Linux
Recommendation Take action as follows.

1. Delete unnecessary files from the list of hidden files
2. If you want to check recently worked files depending on the last time it was changed, use the [-t] flag
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)